Page 4,141«..1020..4,1404,1414,1424,143..4,1504,160..»

Benefits of cloud computing | IBM Cloud

If you are considering adopting cloud technologies and practices, you will receive a ton of different guidance about the benefits you might see.

Infrastructure and workloads

Many companies position the low initial costs and pay-as-you-go attributes as a very significant cost savings. Theyll note the considerable cost of building and operating data centers and argue for avoiding that to save money. Numbers can get astronomical depending on how you calculate them.

SaaS and cloud dev platforms

A software-as-a-service provider may discuss the savings from paying for application access versus purchasing off-the-shelf software. Software providers will add those "cloud attribute" benefits to the specifics of their software. Recently, there has been more discussion regarding the savings that cloud-based platforms can offer developers.

Speed and productivity

How much is it worth to your business if you can get a new application up and running in 30 hours rather than six to nine months? Likewise, the generic "staff productivity" doesn't do justice to the capabilities that cloud dashboards, real-time statistics and active analytics can bring to reducing administration burden. How much does a person hour cost your company?

Risk exposure

I like to think of this simply. What is the impact if you are wrong?

When the negative impact to trying new things is low, meaning that the risk is low, you will try many more things. The more you attempt, the more successes you will have.

If you asked me how to benefit from adopting cloud services, my first question would be, "Which services?" Every user and every organization is going to get a different set of benefits. The most important thing I can suggest is to think across the spectrum. Evaluate the potential savings, but also think about the soft benefits: improved productivity, more speed and lowered risk.

As hockey great Wayne Gretzky observed, you will miss 100 percent of the shots that you dont take. How much of a benefit is it to take your shot?

Read more:
Benefits of cloud computing | IBM Cloud

Read More..

Cloud Computing Trends: 2018 State of the Cloud Survey

In January 2018, RightScale conducted its seventh annual State of the Cloud Survey of the latest cloud computing trends, with a focus on infrastructure-as-a-service and platform-as-a-service.

Both public and private cloud adoption grew in 2018, with larger enterprises increasing their focus on public cloud. AWS is no longer the runaway leader as Azure has grown rapidly and is now a close second, especially among enterprise users. New to the survey this year is data on the large and growing spend on public cloud, which has driven cost optimization to the top of companies' 2018 priority list. To gain control of growing spend, enterprise cloud teams are taking a stronger cloud governance role, including managing costs.

The State of the Cloud Survey is the largest survey on the use of cloud infrastructure thatis focused on cloud buyers and users, as opposed to cloud vendors. Their answers provide a comprehensive perspective on the state of the cloud today.

The survey asked 997 IT professionals about their adoption of cloud infrastructure and related technologies. Fifty-three percent of the respondents represented enterprises with more than 1,000 employees. The margin of error is 3.08 percent.

We highlight several key findings from the survey in this blog post. For the complete survey results, download the RightScale 2018 State of the Cloud Report.

Multi-Cloud Is the Preferred Strategy Among Enterprises

96 Percent of Respondents Use Cloud

More Enterprises Are Prioritizing Public Cloud in 2018

Organizations Leverage Almost 5 Clouds

Serverless Is the Top-Growing Extended Cloud Service

Enterprise Public Cloud Spend Is Significant and Growing Quickly

Enterprise Central IT Teams Shift Role to Governance and Brokering Cloud

Significant Wasted Cloud Spend Makes Optimizing Costs the Top Initiative

Container Use Is Up: Docker Is Used Most Broadly While Kubernetes Grows Quickly

Use of Configuration Tools Grows, with Ansible Showing Strongest Growth

Azure Continues to Grow Quickly and Reduce the AWS Lead, Especially Among Enterprises

Private Cloud Adoption Grows Across the Board

AWS Leads in Users with 50+ VMs While Azure Grows Its Footprint Faster

How AWS, Azure, Google Cloud, and IBM Cloud Stack Up Among Enterprises

In the 12 months since the last State of the Cloud Survey, a multi-cloud strategy remains the preference among enterprises even as the percentage of enterprises who use multiple clouds dropped slightly to 81 percent vs. 85 percent in 2017. Those planning a hybrid cloud strategy fell to 51 percent (from 58 percent in 2017). However, there was a slight increase in the number of enterprises are using multiple public clouds or multiple private clouds.

Both public and private cloud adoption have increased in the last year. The number of respondents now adopting public cloud is 92 percent, up from 89 percent in 2017, while the number of respondents now adopting private cloud is 75 percent, up from 72 percent in 2017. As a result, the overall portion of respondents using at least one public or private cloud is now 96 percent.

Among enterprises, the central IT team is typically tasked with assembling a hybrid portfolio of supported clouds. This year, many more enterprises see public cloud as their top priority, up from 29 percent in 2017 to 38 percent in 2018. Hybrid cloud still leads the to-do list, but has decreased as a top priority for enterprises, declining from 50 percent in 2017 to 45 percent in 2018.

Only 8 percent of enterprises are focusing on building a private cloud, and 9 percent see their top priority as using a hosted private cloud.

On average, survey respondents are using 4.8 clouds across both public and private. Respondents are already running applications in 3.1 clouds and experimenting with 1.7 more.

A significant number of public cloud users are now leveraging services beyond just the basic compute, storage, and network services. Year over year, serverless was the top-growing extended cloud service with a 75 percent increase over 2017 (12 to 21 percent adoption). Container-as-a-service was the second highest growth rate at 36 percent (14 to 19 percent adoption). DBaaS SQL and DBaaS NoSQL were third and fourth (26 and 22 percent growth rates, respectively), but achieved this growth starting from a much larger base of use, with 35 and 23 percent adoption, respectively, in 2017.

As use of public cloud has grown, so has the amount of spend. Public cloud spend is quickly becoming a significant new line item in IT budgets, especially among larger companies. Among all respondents, 13 percent spend at least $6 million annually on public cloud while 30 percent are spending at least $1.2 million per year. Among enterprises the spend is even higher, with 26 percent exceeding $6 million per year and more than half (52 percent) above $1.2 million per year.

Enterprises are not only using a lot of public cloud, but also planning to rapidly grow public cloud spend. Twenty percent of enterprises will more than double their public cloud spend in 2018, while 71 percent will grow spend at least 20 percent.

SMBs generally have fewer workloads overall and, as a result, smaller cloud bills (half spend under $120 thousand per year). However, 13 percent of SMBs still exceed $1.2 million in annual spend.

In contrast, private cloud use will grow more slowly for all sizes of organization. Only 7 percent of each group (enterprises and SMBs) is planning to double its use in 2018. Fewer than half of enterprises (47 percent) and 35 percent of SMBs plan to grow private cloud use by more than 20 percent.

As companies adopt cloud-first strategies, they are increasingly creating a centralized cloud team or a Center of Excellence for cloud. These teams provide centralized controls, tools, and best practices to help accelerate the use of cloud while reducing costs and risk.

Overall, 44 percent of companies already have a central cloud team. Enterprises have an even stronger need for centralized governance within their larger organizations: 57 percent of enterprises already have a central cloud team with another 24 percent planning one.

In 2018 we see enterprise central IT taking a stronger cloud governance role in advising on which applications move to cloud (69 percent in 2018 vs. 63 percent in 2017), managing costs (64 percent in 2018 vs. 55 percent in 2017), setting policies (60 percent in 2018 vs. 58 percent in 2017), and brokering cloud services (60 percent in 2018 vs. 54 percent in 2017).

Even though managing cloud costs is a top challenge, cloud users underestimate the amount of wasted cloud spend. Respondents estimate 30 percent waste, while RightScale has measured actual waste at 35 percent.

With significant wasted cloud spend, organizations are focusing on gaining control of costs. Optimizing cloud costs is the top initiative for the second year in a row, increasing from 53 percent of respondents in 2017 to 58 percent in 2018.

Despite an increased focus on cloud cost management, only a minority of companies have begun to implement automated policies to optimize cloud costs, such as shutting down unused workloads or selecting lower-cost cloud or regions. This represents an opportunity for increased efficiency and increased savings, since manual policies are difficult to monitor and enforce.

Docker adoption increased to 49 percent from 35 percent last year (a growth rate of 40 percent). Kubernetes, a container orchestration tool that leverages Docker, saw the fastest growth, almost doubling to reach 27 percent adoption.

Many users also choose container-as-a-service offerings from the public cloud providers.

The AWS container service (ECS/EKS) followed close behind Docker with 44 percent adoption (26 percent growth rate). Azure Container Service adoption reached 20 percent due to a strong growth of 82 percent, and Google Container Engine also grew strongly (75 percent) to reach adoption of 14 percent.

As part of adopting DevOps processes, companies often choose to implement configuration management tools that allow them to standardize and automate deployment and configuration of servers and applications. Among all respondents, Ansible and Chef are tied with 36 percent adoption each, followed by Puppet at 34 percent adoption.

Ansible showed the strongest growth since last year, up 71 percent in adoption. Chef grew 29 percent and Puppet grew 21 percent.

In 2018, AWS continues to lead in public cloud adoption, but other public clouds are growing more quickly. Azure especially is now nipping at the heels of AWS, especially in larger companies.

And 64 percent of respondents currently run applications in AWS, up from 57 percent in 2017 (12 percent growth rate).

Among enterprises, Azure did even better. Azure increased adoption significantly from 43 percent to 58 percent (35 percent growth rate) while AWS adoption in this group increased from 59 percent to 68 percent (15 percent growth rate). Among other cloud providers that were included in the survey last year, all saw increased adoption this year with Oracle growing fastest from 5 to 10 percent (100 percent growth rate), IBM Cloud from 10 to 15 percent (50 percent growth rate), and Google from 15 to 19 percent (27 percent growth rate).

Enterprise respondents with future projects (the combination of experimenting and planning to use) show the most interest in Google (41 percent).

In contrast to last years survey when we saw private cloud adoption flatten, the 2018 survey shows that adoption of private cloud increased across all providers.

Overall, VMware vSphere continues to lead with 50 percent adoption, up significantly from last year (42 percent). This includes respondents who view their vSphere environment as a private cloud whether or not it meets the accepted definition of cloud computing. OpenStack (24 percent), VMware vCloud Director (24 percent), Microsoft System Center (23 percent), and bare metal (22 percent) were all neck and neck. Azure Stack was in the sixth slot, but showed the highest percentage of respondents that were experimenting or planning to use the technology.

The cloud adoption numbers cited previously indicate the number of respondents that are running any workloads in a particular cloud. However, it is also important to look at the number of workloads or VMs that are running in each cloud. The following charts show the number of VMs being run across the top public and private clouds.

Among all respondents, 15 percent of respondents have more than 1,000+ VMs in vSphere as compared to 10 percent in AWS.

However, AWS leads in respondents with more than 50 VMs, (47 percent for AWS vs. 37 percent for VMware). In third position, Azure shows stronger growth, increasing respondents of more than 50 VMs from 21 to 29 percent.

While public cloud found its initial success in small forward-thinking organizations, over the past few years the battle has now shifted to larger enterprises. AWS has been moving quickly to address the needs of enterprises, and Microsoft has been working to bring its enterprise relationships to Azure. Google and IBM are also focusing on growing their infrastructure-as-a-service lines of business and continue to increase adoption.

The following public cloud scorecard provides a quick snapshot showing that AWS still maintains a lead among enterprises with the highest percentage adoption and largest VM footprint of the top public cloud providers. However, Azure is showing strength by growing much more quickly on already solid adoption numbers. IBM and Google are growing strongly as well but on a smaller base of users.

The 2018 State of the Cloud Survey shows that multi-cloud remains the preferred strategy. Almost every organization is using cloud at some level, with both public and private cloud adoption growing. On average, companies using or experimenting with nearly five public and private clouds with a majority of workloads now running in cloud.

However, public cloud is increasingly becoming the top focus among enterprises and, as a result, public cloud use is growing more quickly with the addition of new customers, an increase in workloads, and an increase in the number of services used.

This expansion in cloud use is driving public cloud spend higher, with large increases expected in 2018. Cost was the number one cloud challenge for intermediate and advanced cloud users. As a result, spend continues to be the top initiative for 2018 as even more organizations are turning their efforts to cost optimization efforts. There is still much room for improvement as 35 percent of cloud bills are wasted due to inefficiencies, and few organizations have yet implemented automated policies to help address these issues.

Enterprise central IT teams are taking a stronger role in cloud adoption, creating central cloud teams or a Center of Excellence. The role of these central teams is focused on cost management and governance as well as advising business units on workloads that should move to cloud. However, business units seek stronger autonomy, except in the area of cost optimization where they look to the central IT team for assistance.

The use of DevOps continues to increase, driving further adoption of container and configuration tools. Docker grew strongly again this year, and Kubernetes showed even stronger growth as a container orchestration solution. Many users are also adopting container-as-a-service offerings from AWS, Azure, and Google.

AWS still leads in public cloud adoption but Azure continues to grow more quickly and gains ground, especially with enterprise customers. Among enterprise cloud beginners, Azure is slightly ahead of AWS. Google maintains the third position, and VMware Cloud on AWS did well in its first year of availability. Adoption of Oracle Cloud is still small, but is growing well in the enterprise.

Cloud provider revenue is driven not just by adoption (percentage of companies using the cloud), but also the number of workloads (VMs) deployed, and the use of other extended cloud services.

Respondents continue to run more VMs in AWS than in other public clouds. However, Azure is growing quickly here as well to reduce AWSs lead.

VMware vSphere continues to lead as a private cloud option (both in adoption and number of VMs) followed by VMware vCloud Director. OpenStack is third, but Azure Pack (sixth place). stands out with the strongest interest level.

Download the RightScale 2018 State of the Cloud Report for the complete survey results.

Use of Charts and Data In This Report

We encourage the re-use of data, charts, and text published in this report under the terms of this Creative Commons Attribution 4.0 International License. You are free to share and make commercial use of this work as long as you attribute the RightScale 2018 State of the Cloud Report as stipulated in the terms of the license.

Continue reading here:
Cloud Computing Trends: 2018 State of the Cloud Survey

Read More..

GoChain (GO): Here’s Why This Altcoin Might $GO All The …

READ LATER - DOWNLOAD THIS POST AS PDF

The need for a faster, friendlier and more decentralized blockchain has led investors to a variety of exchanges this year, searching for viable returns. And while most of the internet chatter on our favorite media sites continues to focus on the loudest competitors in the space (think Tron (TRX) and EOS (EOS) as examples) an exciting crypto-alternative may have slipped past your radar. GoChain (GO) is now getting the attention it deserves as this little-known altcoin consistently leads the market in daily gains.

Announced in February of this year (2018), this blockchain concept, developed to rival Ethereum, quickly made its way to a number of exchanges (includingBinance, where most of this altcoins trading of is done). Since the announcement, a continuous onslaught of positive news and market gains has excited the industry as its competitors stagnate in the current market doldrums we all have experienced.

So, what is GoChain (GO) exactly?

GoChain (GO), whose mainnet was successfully launched earlier this year, is billed as an energy efficient alternative to Ethereum. It is a smart contract platform for dApps with the promise of faster transactions (a lot faster) and increased decentralization. According to their website, GoChain (GO) can provide 1300 transactions per second (compared to Ethereums 13) and can do so with greater decentralization, due to a global network of nodes operated by independent users of the platform.

While these talking-points may sound similar to the rhetoric commonly touted by better-known competitors of the Ethereum killer space, GoChain (GO) has a number of characteristics that investors have started paying closer attention to.

GoChain (GO) is ranked 131 on coinmarketcap.com, and boasts a market capitalization of just under US $40 Million. With its daily volume surpassing US $2.6 Million, there seems to be a lot of room to grow. The price point on this newest crypto darling is still stunningly attractive, hovering near US $.06, despite the 1.02 Billion coins that make up the total supply. In a market surrounded by unicorn valuations (companies with a market cap valued over US $1 Billion) there is a concerted effort by savvy investors to place their fiat in smaller companies, like GoChain (GO), that still have potential to expand.

But what recent developments have the market excited about GoChain (GO)?

October was a busy month for GoChain (GO) as the company exerted its strengths at the annual SanFrancisco Blockchain Week conference. Immediately after the successful conclusion of the conference, the company capitalized on their PR blitz with the announcement of the first decentralized exchange, GODDEX, to be built on the GoChain platform.

GoChain (GO) has started November off with a bang as well, as the company announces a new partnership with LINKCHAIN, a secure supply chain sourcing solution. LINKCHAIN will build its platform on $GO, launching GoChains first security token offering (STO).

GoChain will be providing marketing and fundraising support to LINKCHAIN while assisting in the development of this blockchain-based supply chain solution.

With momentum building and a consistent track record of performance backing the team, GoChain (GO) stands ready to take their platform to the next level. And with the current news of their newest partnership, investors will likely clamor to take advantage of the current price point before this thing explodes in a brand new bull run. And as we watch Gochain (GO) make consistent gains in the near term, we should all be asking ourselves just how far this altcoin could $GO.

For real-time trade alerts and a daily breakdown of the crypto markets, sign up forElite membership!

Disclaimer: This article should not be taken as, and is not intended to provide, investment advice. Global Coin Report and/or its affiliates, employees, writers, and subcontractors are cryptocurrency investors and from time to time may or may not have holdings in some of the coins or tokens they cover. Please conduct your own thorough research before investing in any cryptocurrency and read our fulldisclaimer.

Image courtesy of Pexels

The rest is here:
GoChain (GO): Here's Why This Altcoin Might $GO All The ...

Read More..

Find The Best Bitcoin, Altcoin, or Multi-Cryptocurrency …

At a glance, it becomes very obvious that the Ledger Nano S is the best bet for if you're an altcoin enthusiast. The Nano S currently supports 26 cryptocurrencies not supported by Trezor or KeepKey.

High market cap coins only supported by the Nano S (and sometimes also the Blue) include Ripple, Stellar, Tron, NEO, VeChain, and Qtum.

If you're interested in securely storing any of the coins that are only supported by the Ledger Nano S, then we'd strongly recommend the Nano S for you.

For those of you who are Bitcoin maximalists or are only interested in coins supported by Trezor devices, this is where things get interesting.

From a user-friendliness standpoint, we favor Trezor's web interface to Ledger's Ledger Live" apps.

Trezor

While setting up your Trezor device, you'll be prompted to install the "Trezor Bridge". This is a simple application for your computer that will allow your hardware wallet to communicate with the Trezor web wallet interface. Aside from installing the program, you should never even notice it again, so long as you're using the same computer. New computers you want to use will also need to install the bridge.

After setting up the bridge, you'll be able to fully interact with the Trezor web wallet interface. The wallet allows you to seamlessly switch between different supported coin wallets. With the exception of Ethereum, Ethereum Classic, and NEM, you can view your balances, send transactions, and view your addresses for receiving transfers all from this one page.

Ethereum, Ethereum Classic, and NEM are unique in the way they operate. For these cryptocurrencies, Trezor has been integrated with third-party wallets. This means you get all of the security benefits of Trezor but can't use these coins' wallets directly from Trezor's web interface.

With that said, we still find the Trezor's approach to these altcoins more user-friendly than Ledger's app system (which we'll get to just below).

For example, when you click on "Ethereum (ETH)" in the drop-down menu, you'll see the following pop up to use MyEtherWallet or GoCrypto's Ethereum wallet. You can also navigate to these sites directly.

Once at MyEtherWallet, you can select to connect your Trezor device.

After connecting to MyEtherWallet, you can then use your Ethereum addresses to send and receive transactions. Note that you can also use MyEtherWallet in combination with Trezor to store all ERC-20 tokens.

Ledger

Ledger devices use "Ledger Live", Ledger apps, and some third-party wallet integrations. For those who have used the old Ledger app manager, Ledger live is a big step up for changing between wallets. As the name implies, Ledger Live allows you to view your account balances without having your hardware wallet connected, a feature lacking from Trezor.

What we find most annoying about the Ledger system is the fact that you have to open apps from your device. This means using the hardware every time you want to switch between which wallet apps you're using. While this might sound like a minor inconvenience, it may become super frustrating over time. It's especially cumbersome if you're used to Trezor's seamless switching between wallets.

This shortcoming mostly affects users of the Nano S, as the Blue's touchscreen makes switching between wallets less of a hassle.

All hardware wallets in this guide require users to enter a PIN code to access their device. In a similar vein to the above annoyance, Ledger hardware wallets can be a pain to access. Whereas Trezors have you enter a PIN code on your computer (from an array of numbers shown on the devices), Ledger devices require you to enter your PIN on the hardware itself.

Pin Entry on Ledger Nano S vs Trezor

Again, this is less of an issue for the Ledger Blue, as it's easier to interact with the Blue's touchscreen, compared to the Nano's two button set up.

It's important to note that Ledger's lackluster system is at least partially due to the large number of currencies it supports and its team's dedication to security.

KeepKey

KeepKey uses a simple chrome app for accessing your wallets. While KeepKey boasts even fewer supported cryptocurrencies than Trezor, it offers a pretty great overall user experience for the coins it does support. Unlike the Nano S, we did not have any major frustrations with the KeepKey.

Ledger Nano S

Despite the Ledger Nano S having some annoyances, it's hard to argue this is not the best hardware wallet available. At $99.99, the Nano S is the cheapest hardware wallet while simultaneously offering the most supported cryptocurrencies.

For many, the Nano S is a no brainer just based off of these facts. It's essentially a necessity for altcoin holders, even including popular altcoins like Ripple, Stellar, and Tron.

Even for those who are new to crypto and haven't yet entered into the altcoin waters, you may want to prepare for your seemingly inevitable entry into these markets by opting for the Nano S.

Trezor One & Trezor Model T

The Trezor One (89 ($106) is a tried and true hardware wallet, with a user experience we find better than the Ledger. If you don't need the coin support of Ledgers, then we personally would recommend the Trezor One for this reason. If the roughly $6 difference in price is a deal breaker for you, then you might want to hold off on even purchasing a hardware wallet until you have a larger investment to protect.

Now if you're determined to own a touchscreen hardware wallet, the Model T offers one for about $100 cheaper than the Ledger Blue (~$170 vs $269.99), though it's significantly less pleasing on the eyes. Despite this, it does still offer the touchscreen convenience and slight security benefits while still being able to fit on your keychain.

Ledger Blue

Two words come to mind when looking at the Ledger Blue: "cool" and "unnecessary". For those crypto ballers out there who don't mind shilling out $269.99 for a hardware wallet with less coin support than it's $99.99 counterpart, we see no reason not to.

That being said, the Blue does function as a very easy-to-use choice that offers more coins than non-ledger competitors.

Originally posted here:
Find The Best Bitcoin, Altcoin, or Multi-Cryptocurrency ...

Read More..

Encryption | SANS Security Awareness

What Is Encryption?

You may hear people use the term encryption and how you should use it to protect yourself and your information. However, encryption can be confusing and you should understand its limitations. In this newsletter, we explain in simple terms what encryption is, how it protects you, and how to implement it properly.

You have a tremendous amount of sensitive information on your devices, such as personal documents, pictures, and emails. If you were to have one of your devices lost or stolen, all of your sensitive information could be accessed by whoever possesses it. In addition, you may conduct sensitive transactions online, such as banking or shopping. If anyone were to monitor these activities, they could steal your information, such as your financial account or credit card numbers. Encryption protects you in these situations by helping ensure unauthorized people cannot access or modify your information.

Encryption has been around for thousands of years. Today, encryption is far more sophisticated, but it serves the same purpose -- to pass a secret message from one place to another by ensuring only those authorized to read the message can access it. When information is not encrypted, it is called plain-text. This means anyone can easily read or access it. Encryption converts this information into a non-readable format called cipher-text. Todays encryption works by using complex mathematical operations and a unique key to convert your information into cipher-text. The key is what locks or unlocks your information. In most cases, your key is a password or passcode.

In general, there are two types of data to encrypt: data at rest (such as the data stored on your mobile device) and data in motion (such as retrieving email or messaging a friend).

Encrypting data at rest is vital to protect information in case your computer or mobile device is lost or stolen. Todays devices are extremely powerful and hold a tremendous amount of information, but are also very easy to lose. In addition, other types of mobile media can hold sensitive information, such as USB flash drives or external hard drives. Full Disk Encryption (FDE) is a widely used encryption technique that encrypts the entire drive in your system. This means that everything on the system is automatically encrypted for you; you do not have to decide what or what not to encrypt. Today, most computers come with FDE, but you may have to manually turn it on or enable it. It is called FileVault on Mac computers, while on Windows computers, depending on the version you have, you can use Bitlocker or Device Encryption. Most mobile devices also support FDE. iOS on iPhones and iPads automatically enable FDE once a passcode has been set. Starting with Android 6.0 (Marshmallow), Google is requiring FDE be enabled by default, provided the hardware meets certain minimum standards.

Information is also vulnerable when it is in transit. If the data is not encrypted, it can be monitored, modified, and captured online. This is why you want to ensure that any sensitive online transactions and communications are encrypted. A common type of online encryption is HTTPS. This means all traffic between your browser and a website is encrypted. Look for https:// in the URL, a lock icon on your browser, or your URL bar turning green. Another example is when you send or receive email. Most email clients provide encrypted capabilities, which you may have to enable. A third example of encrypting data in transit is between two users chatting with each other, such as with iMessage, Wickr, Signal, WhatsApp, or Telegram. Apps like these use end-to-end encryption, which prevents third parties from accessing data while its transferred from one end system or device to another. This means only you and the person youre communicating with can read what is sent.

To be sure you are protected when using encryption, it is paramount that you use it correctly:

OUCH! newsletter is under the Creative Commons license. You are free to share / distribute it but may not sell or modify it.

Continue reading here:
Encryption | SANS Security Awareness

Read More..

Avast Internet Security Review 2018 – We Hate Malware

These days you cant be too careful with your computer security setup. With more and more of our daily transactions happening online, its very important to ensure that your computer is protected from the wide array of threats that are circulating on the internet.

In thisAvast Internet Securityreview we cover one of the more popular software programs designed to protect your computer. We get a lot of emails from people asking whether or not this software is worth the cost, so we figured an in-depth review was in order.

A quick note about versions: this review covers Avast Internet Security, which is a step above Avast Free Antivirus. There are also upgraded versions called Avast Premier and Avast Ultimate, which have more features included.

Editors note: We bought this software with our own money and have not been asked by Avast to write this review.

I want to lead with my overall impressions of Avast Internet Security for those who dont want to read a long article then you can drill down and read about all the features in the rest of the review below if you so desire.

Overall I wasnt expecting to be thrilled with Avast Internet Security due to a botched installation when I first installed the software, but my opinion drastically changed once I reinstalled it and found it was working swimmingly.

I actually had more fun than I usually do when reviewing these security software suites because Avast is easy to use, intuitive, and has quite a few bells and whistles that you wont find in other security solutions. I also found their whimsical online and in-program help documentation to be refreshing.

Avast Internet Security is the basic version, a step up from the Avast Free Antivirus. However even this basic level software packs a lot of utilities.

Avasts support was responsive and helpful when I had an issue connecting my online account with my software, and the help and documentation on the website is very well laid out and clear.

Pros:

Cons:

I highly recommend this software as a virus and malware solution. Theres a lot of debate on the internet over which security suite is better, however Avast continues to be highly recommended by many computer professionals. No software will be 100% perfect, so if Avast has the features that you want its a great lightweight solution for protecting your data.

Get Avast Internet Security

Avast was a quick download and install on my Microsoft Surface Pro 4 running Windows 10. The installation was a touch slower than other security apps Ive used, but that could be due to a slightly slower speed of internet as I was working remotely at the time.

After installation I ran the Smart Scan, and the program finished in about 6-7 minutes. The results were interesting as the software scans more than just for malware and viruses. It also found three software programs that needed updates (and allowed me to update them right from the dashboard), and pointed out that the coffee shops WiFi password was weak.

The scan is pretty typical of most security software suites. You can customize the scan in the settings to scan for only the things you want it to for example, you can disable scanning for software updates if you so desire.

Its important to know if your antimalware and antivirus software tools are up to snuff. The good news is that Avast consistently gets top scores in the AV Comparatives monthly score tallies. AV Comparatives is an independent group that tests the top computer security software tools.

You can check out their results here.

Avast Internet Security and all of the other software tools in their library of programs are very intuitive and easy to use. Each setting has a large icon-centric button, and each feature has a small i that you can click that explains the features functionality and uses. This is helpful because even the basic Internet Security program comes with a lot of bells and whistles to play with.

Most computer users will find using Avast to be easy to use and almost fun in fact its the most fun security suite Ive tested. I cant quite put my finger on why, I think its the simplicity and intuitive way everything is laid out.

The black on black color scheme is also a nice touch, making the software feel very updated and modern.

Avast notified me that I had 13 passwords stored in my internet browser, and it asked me to start using Avast Passwords, a password keeping system. I actually use LastPass for that right now, but it seems like a good option for someone who doesnt have a password solution yet. For those who dont know, these password solutions are a great way to enable yourself to use unique and difficult passwords for all of your sites so you dont get caught with your pants down by using the same password for all your sites (something I used to do and I had a minor panic attack when someone hacked my Facebook account and got that password and my email).

You also have the option of storing credit card numbers as well with the ability to auto-fill them when online shopping.

Avast Passwords also has a cool feature called Secure Notes where you can safely store small secure things. Need a place to store your security key for your 2 Factor Authentication app? This could be a good place, instead of a notepad file somewhere on your computer or even writing it down on a paper that could get lost. Lets face it, every once in a while we need to keep a secure number on hand.

After taking my Surface Pro to the coffee shop to do some additional work and continue testing Avast, the software popped up notifying me that I had connected to a new WiFi network. It then gave me the option to scan the network, which scanned the router, and all the devices connected to it meaning ALL the various laptops and phones that were on the network. I dont suspect this coffee shop to be a hotbed of hacker activity, so it was not surprising to find that all the devices came up clean.

This feature is useful for detecting problematic devices that might be on a public network scanning it for activity. Im not usually that paranoid but you can never be too careful. This is useful, however, if you want to do some banking or personal transactions on a public network and want to scan it before using it.

Avast Internet Security has quite a thorough settings menu, where you can tinker with excluded software, customize the Smart Scan, and do so much more. There is really too much to list for this basic review of the software but suffice it to say that if theres something you want to turn on or off or customize, theres a 90% chance youll be able to do it within the settings.

You can even customize the scan parameters in the virus scan portion of the Smart Scan. Most computer users probably wont touch this or need to stray from the default settings, but advanced users will be thrilled with this.

Avast is available for PC, Mac, Android, iPhones and iPads, and even networked smart devices in your home. That makes Avast one of the most compatible software programs out there it covers most devices while many companies stop at just PC and Mac.

Each of these devices needs its own separate version of Avast, however, so unfortunately you cant just buy it once to cover all of your devices. However, youll only need to deal with and learn how to use one program if you want to get Avast security on all devices which is a time saver. Not many people want to learn how to use a bunch of different security software solutions.

Get Avast Internet Security

Avast Internet Security has two higher levels to choose from that will get you a few more bells and whistles. I recommend all the levels, as I think all their tools are useful. However, just ensure that you need the additional tools they offer and you dont already have something similar.

Check this link for Avasts comparison web page.

For Avast Premier, you get webcam spying protection, a file shredder (completely delete a file), and the ability to automatically update apps and software.

With Avast Ultimate you get everything from Premier plus a few other Avast software tools: Avast Cleanup Premium which helps clean up file clutter on your computer, Avast Secureline VPN which shields your location and provides an extra layer of security to your internet browsing, and Avast Passwords Premium which allows you to store your passwords and also warns you of password leaks.

In my opinion, Avast Ultimate is worth it just for the easy to use Secureline VPN, which is very useful. Personally, if you were thinking of upgrading from the basic level I would probably skip Premier and just get Ultimate and get everything.

We used Ultimate for this review so we could be sure to test all the features and be able to write them up. I will say that the SecureLine VPN service works very well and its worth the price. SecureLine VPN is available as a standalone product as well.

No matter what level you are interested in, Avasts line of security software comes highly recommended from me. I had a lot of fun reviewing this software and found it to be refreshing from the rest of the security software thats out there. No program will always protect you 100%, but picking one of the top line programs will give you the best shot at staying safe on the net, and Avast is up to that challenge.

We recommend going with Avast Internet Security or going all the way up to Avast Ultimate.

Get Avast Internet Security

Get Avast Ultimate

These days you can't be too careful with your computer security setup. With more and more of our daily transactions happening online, it's very important to ensure that your computer is protected from the wide array of threats that are circulating on the internet. In thisAvast Internet Securityreview we cover one of the more popular software programs designed to protect your computer. We get a lot of emails from people asking whether or not this software is worth the cost, so we figured an in-depth review was in order. A quick note about versions: this review covers Avast Internet Security,

Avast Internet Security Review 2018

Avast Internet Security Review 2018

2018-04-19

Bill Gordon

Ease Of Use

Effectiveness

Interface / Design

Speed

Customer Support

Features

Excellent!

Avast Internet Security is an easy to use and powerful software suite that enables you to stay one step ahead of internet criminals as well as viruses and malware. For PC, Mac, Android, and iOS

Link:
Avast Internet Security Review 2018 - We Hate Malware

Read More..

Antivirus vs Internet Security [Security Software Comparison]

Threats on the Internet are getting better at penetrating computer systems. Hackers and cybercriminals are developing malicious software that can damage anything from personal computers to mainframes running an entire company. That is why it is necessary to put security layers in place. However, there are several types of security applications. It can be quite confusing for anyone unfamiliar with such programs. Specifically, many experts recommended installing an antivirus program and Internet security.

But, what's the difference between the two? Aren't they the same?

A heuristic is a method of monitoring and evaluation the activities of an application. The antivirus will then decide if it behaves like a virus or not. It will notify the user of any suspicious activities on the computer along with suggested actions. While it is not 100% accurate, this method allows security experts and developers to keep up with the rapidly increasing number of virus online.

Antivirus applications provide a specific security function: protect your computer from virus. Because of this, it can run in the background without any significant effect on the computer's performance. It uses a small amount of memory and CPU. Most of the time, users set their antivirus programs to run immediately during boot. Scheduled scans and updates are also recommended to make sure that your antivirus has the latest virus signatures.

What is an Internet Security?

The firewall protects real-time attacks by filtering any suspicious threats from the Internet and network. The anti-malware and anti-spyware aim to protect the computer against threats which are entirely different from a virus. Malware and spyware are programs which can damage the computer, steal sensitive information, and even hold your system hostage for a ransom.

Internet security suites make it easy to track and monitor your computer's security health. Some even aim to become total computer solutions by including tools such as defragmenting tools, memory cleanup apps, uninstaller, and network monitoring tools, which makes it easy to maintain your computer's health in one place.

However, running an internet security suite takes more computing power than antivirus programs. It still depends on your system. But, older computers may find it challenging to keep Internet security suites running in the background. It demands more memory which slows down some applications and computer functions significantly.

Antivirus Vs Internet Security

Where does anti-malware fit in all of these? As mentioned above, most Internet security come with anti-malware programs as its core function. However, anti-malware programs can also offer multiple services. An excellent example is MalwareFox. It includes features which strengthen your computer security, Aside from scanning for malware, it also has ransomware protection. It protects your system from dangerous ransomware that aims to extort money from you.

MalwareFox also cleans your browser which provides better and faster browsing performance. It also protects your system by analyzing suspicious files and promptly blocks them. The Zero-Day Attack Protection ensures that your system is protected even from the unknown threats. More importantly, unlike Internet security suites, it is light enough to run in the background without affecting your system. MalwareFox can also scan your system in less than five minutes using its Smart Scan Mode.

Anti-malware is a perfect tool for those wanting to have additional protection to run alongside antivirus programs. It is also lighter than total security suites so that you can run it in the background. Most come with features that you will regularly use as your main security functions.

Experts suggest downloading a primary antivirus program. Then, download a secondary solution which can handle most of your security needs. It depends on your needs and what you do online. Anti-malware is appropriate for basic users. Advanced users who download files often, visit various websites and receive a lot of emails may consider Internet security suites at those offer more layers of protection.

Follow this link:
Antivirus vs Internet Security [Security Software Comparison]

Read More..

Security Packages | High-Speed Internet | Windstream

Shield Lite

Security Suite provides protection against the latest threats 24/7, requiring no action on your part. Our software continually updates itself with new enhancements and upgrades delivered behind-the-scenes. Backed by renowned McAfee products, updates of any kind download faster. Our simple user interface is designed for ease of use.

Identity Theft Protection provides you with 24/7 credit monitoring and instant access to your credit report and credit score. It also provides you with SSN monitoring that alerts you when activities or changes take place using your Social Security Number. Our Identity Theft Protection also includes CyberGuard, which monitors known criminal websites for illegal trading of personal information. Other features include: change of address monitoring, non-credit loans monitoring, restoration services, and one million dollar insurance.

Online Data Backup keeps a copy of all of your most important files so you never lose them. It also allows you to share files with your family and friends and access and organize your files from anywhere.

Follow this link:
Security Packages | High-Speed Internet | Windstream

Read More..

Internet Security Lectures by Prabhaker Mateti

Internet Security Lectures by Prabhaker MatetiPrabhaker Mateti

Abstract:Data integrity and privacy on the Internet primarily rests on usingcryptography well. Unfortunately, it is easily compromised by errorsin (operating) system configuration. This lecture is a quick overviewof cryptography as relevant in Internet security and passwords.

Data integrity and privacy on the Internet primarily rests on usingcryptography well. The design and implementation of cryptographyrequires deep understanding of discrete mathematics and number theory.Unfortunately, when cryptography is deployed carelessly, it is easilycompromised by errors in (operating) system configuration. Thislecture is a quick overview of cryptography as relevant in Internetsecurity and passwords.

A cryptographic encryption algorithm, also known as cipher,transforms a "plain text" (e.g., humanreadable) pt and outputs cipher textct as the output,

so that it is possible to re-generate the pt fromthe ct through a companion decryption algorithm. Notethat we said "for example, human readable" and not"that is, human readable" as an explanation for the phrase"plain text". Often, the so-called "plain text"is human un-readable binary data that is ready-to-be-used by acomputer.

Ciphers use keys together with plain text as the input to produce cipher text. It is in the key that the security of a modern cipher lies, not in the details of the algorithm.

Roughly speaking, computationally infeasible means that a certaincomputation that we are talking about takes way too long (hundreds ofyears) to compute using the fastest of (super)computers.

Suppose our key is a 128-bit number. There are

340,282,366,920,938,463,463,374,607,431,768,211,456

128-bit numbers starting from zero (i.e., 128 bits of 0). Torecover a particular key by brute force, one must, on average, searchhalf the key space:

170,141,183,460,469,231,731,687,303715,884,105,728.

If we use 1,000,000,000 machines that could try 1,000,000,000keys/sec, it would take all these machines longer than the universe aswe know it has existed to find the key.

This is not the same thing as saying that computationalinfeasibility is the same idea as Turing-incomputable. Nor is it thesame thing as saying that you cannot make a lucky guess, orheuristically arrive at a possible answer, and then systematicallyverify that the guessed answer is indeed the correct answer, all donewithin a matter of seconds on a lowly PC. Here is an example:Microsoft Windows NT uses the DES encryption algorithm in storing thepasswords. Brute-forcing such a scrambled password to compute theplain text password can take, according to Microsoft, "about abillion years." But the L0pht team( http://www.l0pht.com) claims thatL0phtCrack breaks Windows passwords in about one week, running in thebackground on an old Pentium PC.

In the context of cryptography, the factorization of an arbitrarilylarge number N, into its constituent primes, determining the powersn2, n3, n5, n7, etc. of the primes, is computationally infeasible --as far as we know.

N = 2n2 * 3 n3* 5 n5 * 7 n7* ...

Based on this, the decryption is computationally infeasible. Note thatthis is assuming that we are using known methods, including brute force.

Is it possible that some one or some country has actuallydiscovered fast algorithms, but chose to keep them secret, for these tasksthat we believe to be computationally infeasible?

A hash function maps input sequences of bytes into a fixed-lengthsequence. The fixed length is considerably shorter than thetypical length (thousands of bytes) of the input, and hence thefunction is a hash function.

The nature of all hash functions is that there must exist multipleinput sequences that map to the same hash. The inverse is amathematical relation, not a mathematical function. But, good hashfunctions have the following properties: It is hard to find twostrings, from the expected set of typically used strings, that wouldproduce the same hash value. A slight change in an input stringcauses the hash value to change drastically.

A "one way" hash function is designed to be computationallyinfeasible to reverse the process, that is, to algorithmicallydiscover a string that hashes to a given value.

One-way hashfunctions are also known as message digests (MD), fingerprints, orcompression functions. The most popular one-way hash algorithms areMD4 and MD5 (both producing a 128-bit hash value), and SHA, also knownas SHA1 (producing a 160-bit hash value).

As of 2006, both MD5 and SHA1 are considered separately broken. Thatis, given plain text p, it is possible to modify p to a desired p' sothat md5(p) == md5(p'); similarly, for SHA1. What is not known is ifwe can modify p to a p' so that md5(p) == md5(p') and sha1(p)== sha1(p').

Symmetric-key cryptography is an encryption system in which thesender and receiver of a message share a single, common key to encryptand decrypt the message. Symmetric-key systems are simpler andfaster, but their main drawback is that the two parties must somehowexchange the key in a secure way. Symmetric-key cryptography issometimes also called secret-key cryptography.

If ct = encryption (pt, key), then pt = decryption (ct, key).

The most popular symmetric-key system is the DES, short for DataEncryption Standard. DES was developed in 1975 andstandardized by ANSI in 1981 as ANSI X.3.92. DES encrypts data in64-bit blocks using a 56-bit key. The algorithm transforms theinput in a series of steps into a 64-bit output.

IDEA (International Data Encryption Algorithm) is a block cipherwhich uses a 128-bit length key to encrypt successive 64-bit blocks ofplain text. The procedure is quite complicated using subkeys generatedfrom the key to carry out a series of modular arithmetic and XORoperations on segments of the 64-bit plaintext block. The encryptionscheme uses a total of fifty-two 16-bit subkeys.

Blowfish is a symmetric block cipher that can be used as a drop-inreplacement for DES or IDEA. It takes a variable-length key, from 32bits to 448 bits, making it ideal for both domestic and exportableuse. Blowfish is unpatented and license-free, and is availablefree for all uses.

Public key cryptography uses two keys -- a public key knownto everyone, and a private or secret key that is safeguarded. Public key cryptography was invented in 1976 by WhitfieldDiffie and Martin Hellman. For this reason, it is sometimes alsocalled Diffie-Hellman encryption. It is also calledasymmetric encryption because it uses two keys instead of one key. The two keys are mathematically related, yet it is computationally infeasible to deduce one from the other.

Unfortunately, public-key cryptography is about 1000 times slowerthan symmetric key cryptography.

The most well-known of the public-key encryption algorithms is RSA, named after its designers Rivest, Shamir, and Adelman. The un-breakability of the algorithm is based on the fact that there is no efficient way to factor very large numbers into their primes.

An example of the above numbers: rsa.txt. Look up the man page: openssl(1).

The e and d are symmetric in that using either ((n,e) or (n,d)) as the encryption key, the other can be used as the decryption key.

The only way known to find d is to know p and q. If the number n is small, p and q are easy todiscover by prime factorization. Thus, p and q are chosen to be as large as possible,say, a few hundred digits long. Obviously, p and qshould never be revealed, preferably destroyed.

Encryption isdone as follows. Consider the entire message to be encrypted asa sequence of bits. Suppose the length of n in bits is b. Split the message into blocks of length b or b-1. A block viewedas a b-bit number should be less than n; if it is not, choose it to beb-1 bits long. Each block is separately encrypted, and theencryption of the entire message is the catenation of the encryptionof the blocks. Let m stand for a block viewed as a number. Multiply m with itself e times, and take the modulo n result as c,which is the encryption of m. That is, c = m^emod n.

Decryption is the "inverse" operation: m = c^dmod n.

The Digital Signature Algorithm (DSA) is a United States Federal Government standard for digital signatures.

An example of the above numbers: dsa.txt.Look up the man page: openssl(1).

Public-key systems, such as Pretty Good Privacy (PGP), are popular for transmitting information via the Internet. They are extremely secure and relatively simple to use. You need to retrieve the recipient's public key from one of several world-wide registries of public keys that now exist to encrypt a message.

When John wants to send a secure message to Jane, he uses Jane's public key to encrypt the message. Jane then uses her private key to decrypt it.

In real-world implementations, public keys are rarely used to encrypt actual messages because public-key cryptography is slow. Instead, public-key cryptography is used to distribute symmetric keys, which are then used to encrypt and decrypt actual messages, as follows:

A digital signature is a way to authenticate to a recipient that a received object is indeed that of the sender.

The public key-based communication between Alice and Bob described above is vulnerable to a man-in-the-middle attack.

Let us assume that Mallory, a cracker, not only can listen to thetraffic between Alice and Bob, but also can modify, delete, andsubstitute Alice's and Bob's messages, as well as introduce newones. Mallory can impersonate Alice when talking to Bob andimpersonate Bob when talking to Alice. Here is how the attackworks.

A man-in-the-middle attack works because Alice and Bob have no wayto verify they are talking to each other. An independent third partythat everyone trusts is needed to foil the attack. This third partycould bundle the name "Bob" with Bob's public key and signthe package with its own private key. When Alice receives the signedpublic key from Bob, she can verify the third party's signature. Thisway she knows that the public key really belongs to Bob, and notMallory.

A package containing a person's name (and possibly some otherinformation such as an E-mail address and company name) and his publickey and signed by a trusted third party is called a digital certificate (ordigital ID). An independent third party that everyone trusts, whoseresponsibility is to issue certificates, is called a CertificationAuthority (CA). A digital certificate serves two purposes. First, itprovides a cryptographic key that allows another party to encryptinformation for the certificate's owner. Second, it provides a measureof proof that the holder of the certificate is who they claim to be -because otherwise, they will not be able to decrypt any informationthat was encrypted using the key in the certificate.

The recipient of an encrypted message uses the CA's public key todecode the digital certificate attached to the message, verifies it asissued by the CA and then obtains the sender's public key andidentification information held within the certificate. With thisinformation, the recipient can send an encrypted reply.

The most widely used standard for digital certificates is X.509,which defines the following structure for public-key certificates:

You can obtain a personal certificate from companies likeverisign.com or comodo.com.

The Web.

View post:
Internet Security Lectures by Prabhaker Mateti

Read More..

Vipre Internet Security 2016 Free Download – Softlay

Vipre internet security 2016 free download latest version for windows xp/7/8/10. Get offline standalone setup of Vipre internet security 2016 for windows 32-64 bit PC. Award wining Vipre combines with antivirus and anti spyware technologies, and other advanced features protect, & wont let slow down your computer.

Protect yourself from all kind of potential threats such as Trojans, malware, Spam, Spyware & cyber-crime. Vipre internet security software 2016 is handy tool which protects your PC against threats. Its antivirus and firewall software for PC users. The installation process is easy it has intuitive user interface. Virpe consumes less system resources while scanning for threats and viruses on your computer, keeping your PC fast for routine tasks.

Real time protection feature of Vipre watches for threats. It also safeguard you while browsing online, checking for the link that may harm your computer. It also block all malicious websites on your computer. You can also scans removable drives from vipre internet security 2016 before connecting to your PC. Social watch feature scan for all bad links on your Facebook account that could harm your PC with malware, spyware, Trojans etc. Protecting yourself from email threats, it scans internet security threats in Outlook, Outlook Express, Windows Mail, and any email program using POP3 and SMTP.

Below are the key features of Vipre 2016 internet security software.

Below are the minimum system requirements for Internet security software 2016.

Excerpt from:
Vipre Internet Security 2016 Free Download - Softlay

Read More..